[PATCH] audit signal recipients
authorAmy Griffis <amy.griffis@hp.com>
Thu, 29 Mar 2007 22:01:04 +0000 (18:01 -0400)
committerAl Viro <viro@zeniv.linux.org.uk>
Fri, 11 May 2007 09:38:25 +0000 (05:38 -0400)
commite54dc2431d740a79a6bd013babade99d71b1714f
tree16b0990d5c16946239a17b332f54b5918fb03305
parent7f13da40e36c84d0d046b7adbd060af7d3717250
[PATCH] audit signal recipients

When auditing syscalls that send signals, log the pid and security
context for each target process. Optimize the data collection by
adding a counter for signal-related rules, and avoiding allocating an
aux struct unless we have more than one target process. For process
groups, collect pid/context data in blocks of 16. Move the
audit_signal_info() hook up in check_kill_permission() so we audit
attempts where permission is denied.

Signed-off-by: Amy Griffis <amy.griffis@hp.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
arch/ia64/kernel/audit.c
arch/powerpc/kernel/audit.c
arch/s390/kernel/audit.c
arch/sparc64/kernel/audit.c
arch/x86_64/kernel/audit.c
include/linux/audit.h
kernel/audit.h
kernel/auditfilter.c
kernel/auditsc.c
kernel/signal.c
lib/audit.c